UNIX Security

Course

In Cardiff

£ 2,995 + VAT

Description

  • Type

    Course

  • Location

    Cardiff (Wales)

  • Duration

    2 Days

  • Start date

    Different dates available

Delegate pack consisting of course notes and exercises Manual Experienced Instructor Refreshments

Facilities

Location

Start date

Cardiff
See map
Castle Street, CF10 1SZ

Start date

Different dates availableEnrolment now open

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

This centre's achievements

2016

All courses are up to date

The average rating is higher than 3.7

More than 50 reviews in the last 12 months

This centre has featured on Emagister for 8 years

Subjects

  • Access Control
  • Management
  • Accounts
  • Access
  • Security
  • Audit
  • Auditing
  • Unix
  • IT
  • Network
  • Solaris
  • IT Auditing
  • Systems
  • Programming
  • IT Security
  • Network Training
  • IT Management

Course programme

The Knowledge Academy UNIX Audit & Security Course 2 day course covers the following topics:

Introduction

This course is designed for individuals who need to find out what UNIX is and where the different components are located, with a specific security objective in mind. Planning for audits and discussion of suitable tests forms a substantial part of the course.

Individuals will get a chance to run audit and security related commands.

Pre-Requisites

  • Individuals should have experience of using UNIX
  • Shell Programming and C Programming experience would be an advantage

Who Should Attend

  • Computer Auditors
  • Security Specialists
  • Security Conscious Managers

Course Content

Introduction to Audit & Security

  • Audit & Security
  • Security
  • Audit
  • Checklist-Based Auditing
  • Risk-Based Auditing
  • Audit Plan
  • Check Lists
  • DISA Database STIG
  • NIST
  • The Big Picture

Access Control

  • Intrusion Prevention
  • Intrusion Detection
  • Secure Data Storage
  • Secure Data Access
  • UNIX Deployment Model

Introduction to UNIX

  • History Of Unix
  • Unix Features
  • Unix System V
  • Standards
  • UNIX Architecture
  • UNIX Standards
  • Product Standards
  • Application Programming Interface
  • Commands & Utilities
  • Operating System Versions
  • Solaris
  • HP-UX
  • AIX
  • IRIX
  • Linux
  • Patch Levels

UNIX Start-up & Shutdown

  • Power On
  • Kernel Processes
  • init
  • System V
  • BSD
  • Changing Run Levels
  • Changing run levels with init
  • Graceful Run Level Changes
  • Quick Shutdown
  • Firmware
  • Boot to Single User Mode
  • Start Solaris Installation
  • Boot From alternative boot disk
  • Emergency boot From CDROM

Access Control

  • Managing Logins
  • Login Processes
  • Local Login
  • (‘Old’ System V – up to Sys V Rel 3)
  • (‘New’ System V – from Sys V Rel 4)
  • (BSD Unix)
  • Network Login
  • Accepting a login name
  • Logon Banners

Creating & Maintaining User Accounts

  • /etc/passwd
  • /etc/shadow
  • useradd
  • The group file
  • The Shells
  • Customising User Environments - Initialisation Scripts
  • Password Management
  • Lock A User Account
  • The root Account
  • Restricting Root Access
  • Encrypting Root Network Access
  • Reserved User Accounts
  • Single-User Mode
  • Multi-User Mode
  • Shared User Accounts
  • Duplicate User ID Accounts

System Security

  • Usernames & Passwords
  • /etc/passwd and /etc/shadow
  • Password Ageing
  • Login Control with /etc/default/login
  • Switching User with su
  • su Control with /etc/default/su
  • Limiting The Number Of Failed Login Attempts
  • Setting Minimum Password Length
  • Password Character Mix
  • Password Repeating Characters
  • Standard File & Directory Permissions
  • File & Directory Permissions
  • Special Permissions SUID & GUID
  • Access Control Lists

Process Management

  • Processes Overview
  • Parent & Child
  • Killing Application Processes
  • Changing Process Priorities
  • Changing Priority of Running Processes With renice

Scheduling & Job Control

  • Delayed Execution with the at Command
  • Restricting Access To at
  • Cron
  • Restricting Access To cron
  • Logging

Disk Management

  • Partition and Volume Group Layout
  • Disk Layout
  • Solaris Partitions & Slices
  • Device Files
  • Logical Device Names
  • RAID
  • Physical Device Names
  • UNIX File Systems
  • Traditional UNIX Filesystem
  • Journaled File Systems
  • Mounting a Filesystem
  • Unmounting a File System
  • Mounting At Boot Time
  • Traditional File System Corruption
  • File System Checking With fsck
  • NFS File Systems
  • RAM Based File Systems
  • Swap Management

Backing Up

  • Backup Media
  • Why Backup?
  • Backup Types
  • Full Backup
  • Incremental Backup
  • Partial Backup
  • Backing Up With tar
  • Absolute and Relative Paths
  • Image Copying With dd
  • Backing Up With cpio
  • Backing Up With dump
  • Dump Levels

Network Services

  • TELNET
  • Secure Shell
  • FTP
  • Restricting FTP access
  • Anonymous FTP
  • Secure FTP
  • The R Commands
  • Host-Level Security with /etc/hosts.equiv
  • User-Level Security with .rhosts
  • The rlogin Command
  • The rcp Command
  • The rsh & rcmd Commands

UNIX Vulnerabilities

  • Intrusion Detection
  • Network Services
  • /etc/inetd.conf
  • /etc/hosts.allow
  • Denial Of Service Attacks
  • Trojan Horses, Viruses & Worms
  • Vi Editor
  • .exrc
  • Shell Escapes
  • Set user ID programs
  • Booting from CD
  • File System Ownership & Permissions
  • File system Corruption
  • Startup and Shutdown Scripts
  • UNIX services
  • Network Service User Equivalence
  • Backup storage
  • System Clock

UNIX Auditing

  • The find command
  • The grep command
  • The who command
  • The last command
  • The ps command
  • System Accounting

Additional information

  • UNIX Training provided by the Largest Training Company globally
  • Computer Auditors, Security Specialists & Security Conscious Managers recommended
  • Designed for individuals who need to find out what UNIX is and where the different components are located
  • GUARANTEED LOWEST PRICE IN THE INDUSTRY
  • Individuals will get a chance to run audit and security related commands
  • Courses delivered by world class UNIX training instructors in luxury venues 
  • UNIX Training includes material and manuals
  • Book Online or Call 01344 203999 to speak to an UNIX training advisor today

UNIX Security

£ 2,995 + VAT